Join us at the Mobile Phone Security professional workshop
Terminus System Information Security Workshops & Training Courses
LEARN HOW TO FIND YOUR OWN SYSTEMS VULNERABILITIES BEFORE THE BAD GUYS ATTACK THEM
How can you assess the security of your Mobile Phone?
Learn how to test the security of your Mobile Phone using techniques attackers use. You will learn this hands-on at our Mobile Phone Security Workshop. This is one workshop series you wouldn’t want to miss!
This hands-on course focuses on tactics, techniques, and procedures used by both black hat attackers and penetration testers (white hat hackers).
The workshop starts with an overview of hacking incidents, trends, and attacker motivations. The course progresses to penetration testing methodologies. These often overly complicated methodologies, filled with an excessive number of steps, are simplified in this course with an emphasis on the penetration test objective.
Each hacking phase of the simplified methodology is demonstrated, discussed, and practiced. Attendees practice penetration testing in a fun and interactive environment with multiple live targets.
Is this Workshop for you?
If you have been considering upgrading your knowledge in mobile security management, develop your skills in mobile security testing and enhance your capability to manage your mobile system, this workshop is for you.
Learn from the Pros on how to analyze the weakness in your mobile phone, assess how it can impact you if exploited, and know how to defend your mobile phone from malicious attacks.
THIS WORKSHOP IS A 1-DAY TRAINING CURRICULUM THAT PREPARES STUDENTS TO PROTECT THEMSELVES WHILE OPERATING ON UNTRUSTED (PUBLIC) NETWORKS
Mobility as a technology will be a disruptive force for the next decade; and enterprise mobility programs will be fundamental for organizations to remain relevant. Mobile security is the core foundation for effective use of mobility as an enabling technology. Attacks on individuals and organizations through mobile devices and apps are intensifying, and are rapidly becoming the preferred vector for stealing personal and corporate data. The vulnerabilities and threats to mobility span across devices, applications, networks, transactions and operations, necessitating a comprehensive mobility security framework to mitigate the associated risks.
This workshop is an instructor-led, group-live instruction that includes relevant topics and hands-on practical exercises. Scenario-based practical exercises will be performed. Students will be shown how to select from a variety of open source (free) security tools and employ techniques to successfully secure their personal data.
This workshop can accommodate up to 15 students
This workshop is designed to introduce mobile cyber security threats, protection techniques, and operational security controls. In this workshop you will learn how to:
- Communicate mobile device security threats and the risks
- Describe mobile applications and device Security functions
- Discover mobile hacking techniques (Android and iOS)
- List platform and device security models
- List pitfalls to mobile device security
- Perform attacks against sample mobile apps to understand the weaknesses that exist in the current device security models
- Perform mobile app, file system and runtime analysis
- Assess mobile app and device security
- Implement secure coding techniques into your mobile development lifecycle
- Protect your mobile apps from high risk attacks
- Identify business logic and technical vulnerabilities in your mobile applications
- Capture the business logic flow of the mobile application
- Secure mobile applications from technical and business logic perspectives
- Understand real-world attack techniques
- Identify the application’s vulnerabilities that can be exploited using installed applications on mobile devices
- Assess mobile device security issues
- Test and discover vulnerabilities present in mobile devices, applications, servers and the networks
- Learn about assessments attempt to detect mobile vulnerabilities
- Ensure trusted interactions at the application, device and network levels
- Man-in-the-middle attacks
- Cellular proxy attack (provisioning profile)
- Insufficient validation of certificates / certificate chain
- SSL compromise
- DNS hijacking
- SSL session with validation
- Validate originated from a trusted CA
- Validate the certificate has not been revoked
- Describe how to implement / validate client-side certificates
- SSL pinning
For more information or if you would like to register, visit our web site www.terminus-system.com or email firstname.lastname@example.org